http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Energy Consumption Analysis of Delay Tolerant Network Routing Protocols
Regin A. Cabacas, Hideaki Nakamura,In-Ho Ra 보안공학연구지원센터 2014 p.1-10
Lexicon-Driven Word Recognition Based on Levenshtein Distance
Perdana Adhitama, Soo Hyung Kim,In Seop Na 보안공학연구지원센터 2014 p.11-20
A Systematic Review of Software Process Improvement by CMMI
Poonam Dhankhar, Anil Kumar Mishra 보안공학연구지원센터 2014 p.21-26
Conversion 2D Image to 3D Based on Squeeze function and Gradient Map
Lee Sang-Hyun, Park Dae-Won,Jeong Je-Pyong,Moon Kyung-Il 보안공학연구지원센터 2014 p.27-40
Adaptive Interpolation Algorithm Considering Total Edge Directions for Effective Deinterlacing
Jongho Kim 보안공학연구지원센터 2014 p.41-50
Identifying Causality Relation between Software Projects Risk Factors
Haneen Hijazi, Shihadeh Alqrainy,Hasan Muaidi,Thair Khdour 보안공학연구지원센터 2014 p.51-58
Improving Test Process for Test Organization assessed with TMMi Based on TPI NEXT
Kidu Kim, Young Chul Kim 보안공학연구지원센터 2014 p.59-66
An HTML5-based Interactive E-book Reader
Jongmyung Choi, Youngho Lee,Kiyoung Kim 보안공학연구지원센터 2014 p.67-74
Search-Based Information Retrieval and Fault Prediction with Distance Functions
Ekbal Rashid, Srikanta Patnaik,Vandana Bhattacherjee 보안공학연구지원센터 2014 p.75-86
The Model of Reuse for Mobile device Cloud Environments
Kangchan Lee, Seungyun Lee,Hee-Dong Yang 보안공학연구지원센터 2014 p.87-94